Skip to content

Main Navigation

Gigaom Search
  • Menu

  • About Us
  • ResearchExpand
    • Cloud & Infrastructure
    • Data Infrastructure, AI & Analytics
    • Edge & Networking
    • Security & Risk
    • DevOps & Applications
  • Analysts
  • Search
  • Sign in
Become a Client
Business Team Working Together Using Cloud Service
Image credit: AttoStock
Sponsored by

Part 2 of 2 in a Series

Zero Trust Cloud Security Provider Aporeto: Product Profile and Evaluation Part 1
Iben Rodriguez Nov 6, 2019 (Oct 30, 2020) -- Report

Zero Trust Cloud Security Provider Aporeto: Product Profile and Evaluation v1.0

Stronger Security, Simpler Operations, and Better ROI

Table of Contents

  1. Summary
  2. Legacy Network Security Controls
  3. Aporeto Zero Trust Cloud Security Overview
  4. Field Test Lab Setup and Methodology
  5. Results: Aporeto vs. Legacy
  6. Conclusion
  7. About Iben Rodriguez
  8. About GigaOm
  9. Copyright

Summary

Microservices approaches such as Kubernetes are changing the way people think about applications, bringing the dual benefits of massive scalability and modularity. Containers abstract the applications away from the systems and network infrastructure. As a result, goes the theory, application developers can create software without having to request network configuration or other operational changes. However, while this idea of masking what goes on “under the bonnet” is good, it can also be a source of risk. Not the least, for example, is that Kubernetes allocates services to server nodes dynamically. This leaves network and security engineers with a limited set of choices: for example, either restrict Kubernetes clusters to only run within a security-controlled subnetwork (which, of course, undermines the very principle of the distributed microservices architecture), or face the need to open up network firewalls to allow clusters to communicate, undermining security and losing visibility on network activity. Considered in isolation, neither option is particularly attractive. Given an already-challenging network environment, with multiple application types (each with different connectivity needs) and permissions systems, constantly changing endpoints, equipment refresh cycles, fault resolution, and new security vulnerabilities emerging all the time, the result creates a new set of problems to be solved. Engineers have only limited time, and such compromises can have knock-on effects on other systems, leading to inefficiency, cost, and frustration.

Micro-segmentation approaches, such as Aporeto, enable application-specific security controls to be allocated while keeping networking and security professionals assured of policy definition and enforcement. This creates a middle ground between an “anything goes” approach and having a fully locked-down environment, allowing application developers to define and control the ways their application elements communicate while working within predefined security stipulations.

In this report, we provide a comprehensive independent review of the Aporeto solution for network and identity management in a multi-cloud deployment. We review the practicalities of deploying Aporeto to deliver a stronger security architecture for Kubernetes container microservice applications running across distributed networks anywhere. We also evaluate the impact on the IT operations team of running Aporeto versus maintaining legacy security practices. The return on investment for an identity-based security solution becomes clear as we progress through the following series of tests.

The GigaOm Multi-Cloud Test Lab environments used in this report include Amazon Web Services (AWS), Google Cloud Platform (GCP), and Microsoft Azure although the findings are relevant for other clouds and on-premises solutions such as VMware, Packet, IBM Softlayer, etc.

Full report available to GigaOm Subscribers.

Subscribe to GigaOm Research
Cloud & Infrastructure, Containers, Security & Risk
  • Tweet
  • Share
  • Post

Related Research

Usb pen, information code
Image credit: blackdovfx
Sponsored by
Enrico Signoretti May 13, 2021 @ 12:00 PM CDT -- Live Webinar

The What, Why, and How of Kubernetes Data Storage

This free 45 minute webinar from GigaOm Research brings together experts in Kubernetes and data storage, featuring GigaOm analyst Enrico Signoretti and…

Register
Object Storage
ARZmV45N
Image credit: ipopba
Sponsored by
David S. Linthicum, Andy Thurai Apr 29, 2021 @ 12:00 PM CDT -- Live Webinar

The Essence of Observability

This free 1-hour webinar from GigaOm features analysts David Linthicum and Andy Thurai and special guests from VMware, Harmen Van der Linde,…

Register
Cloud Storage
computer-2760136_1920
Image credit: Thomas Ulrich
Enrico Signoretti Apr 23, 2021 (Apr 22, 2021) -- Report

GigaOm Vendor Profile: OSNEXUS

OSNEXUS QuantaStor is a software-defined storage solution based on the open-source Ceph project. QuantaStor eliminates all of the complexity of Ceph, thanks…

Read More
Object Storage
Cloud connecting devices
Enrico Signoretti, Max Mortillaro, Arjan Timmerman Apr 20, 2021 (Apr 26, 2021) -- Key Criteria & Market Landscape

Key Criteria for Evaluating Kubernetes Data Storage

Enterprises of all sizes are embracing hybrid cloud strategies that are ever more complex and structured, moving quickly from a first adoption…

Read More
Data Storage for Kubernetes
image13
Michael Delzer Apr 14, 2021 (Apr 14, 2021) -- Market Radar

GigaOm Radar for Performance Testing Tools

Performance testing is the process that tests various parameters of software applications under particular loads and provides actionable feedback as part of…

Read More
DevOps & Testing
Isometric Cloud Computing Concept Represented By A Server, With
Image credit: Golden Sikorka
Sponsored by
Enrico Signoretti Apr 14, 2021 (Apr 14, 2021) -- Solution Brief

Kasten by Veeam

Kasten, now a part of Veeam, has developed one of the most innovative Kubernetes-native data protection solutions on the market. It now…

Read More
Data Protection for Kubernetes

Stay on top of emerging trends impacting your industry with updates from our GigaOm Research Community.

Join Research Community
Gigaom
  • About Us
  • Analysts
  • Press Room
  • Contact
  • Twitter
  • Facebook
  • LinkedIn
  • RSS Feed
  • Newsletter
  • Privacy Policy
  • Terms of Service
  • © GigaOm All Rights Reserved 2021
This website uses cookies; by continuing you are a agreeing to our Privacy Policy Accept
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled

This is an necessary category.

Save & Accept